This sixth volume in the series "Integrity and Internal Control in Information Systems" is a state-of-the-art collection of papers in the area of integrity within information systems and the relationship between integrity in information systems and the overall internal control systems that are established in organizations to support corporate governance codes. Integrity and Internal Control in Information Systems VI represents a continuation of the dialogue between information security specialists, internal control specialists and the business community. The objectives of this dialogue are: To present methods and techniques that will help business achieve the desired level of integrity in information systems and data; To present the results of research that may in future be used to increase the level of integrity or help management maintain the desired level of integrity; To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general. The book contains a collection of papers from the Sixth International Working Conference on Integrity and Internal Control in Information Systems (IICIS), sponsored by the International Federation for Information Processing (IFIP) and held in Lausanne, Switzerland in November 2003. It will be essential reading for academics and practitioners in computer science, information technology, business informatics, accountancy and IT-auditing.
Refereed papers.- Remote Integrity Checking.- Automated Checking of SAP
Security Permisisons.- A Formal Analysis of a Digital Signature
Architecture.- Using Parameterized UML to Specify and Compose Access Control
Models.- Enforcing Integrity in Multimedia Surveillance.- A Learning-based
Approach to Information Release Control.- Information Security Governance
using ISO 17799 and COBIT.- Tracing Attacks and Restoring Integrity with
Lascar.- A Secure Multi-Sited Version Control System.- Integration of
Integrity Constraints in Database Federations.- Reducing Disruption in
Time-Tabled Condition Monitoring.- A Service Oriented System Based
Information Flow Model for Damage Assessment.- An Efficient OODB Model for
Ensuring the Integrity of User-Defined Constraints.- Invited papers.- From
Security Culture to Effective E-Security Solutions.- Consistent Query
Answering.- Role of Certification in Meeting Organisation Security
Requirements.- Panel session.- Grand Challenges in Data Integrity and
Quality: Panel Discussion.
Dr. Sushil Jajodia is Professor and Chairman of the Dept. of Information and Software Engineering, and Director of the Center for Secure Information Systems at the George Mason University, Fairfax, Virginia, USA